go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: general-updates-and-announcements

Go to Homepage [0], contents or to navigation menu



Hanukkah is ending, what did you get for tech presents this year?

Hi all,

As Hanukkah comes to a close, I’m curious if you celebrated it, what you got? Since this blog and podcast is a tech related podcast, you’re welcome to feel free to submit demonstrations of your tech that you’ve gotten. Please feel free to email me, and we’ll make arrangements for delivering the file to me. I hope you’ll enjoy the tech you’ve gotten

Comments (0)

Comments on the last article

Hi.
Well in theory, if there are issues with say a criminal, and the government/ the law want to look at it I have no issue with them doing so.
I don’t have anything to hide.
Backdoors in software and hardware though, not sure if you want that to be a thing as such.
Secure accounts in all things so the government can look if they need or a way maybe then.
But firstly can you trust the government to be secure.
There have been a lot of breaches in some of our government’s systems, especially under high load where the system has spewed the wrong data to someone else.
Next, there are governments in general, look at china, even if this is not fully true.
How do you trust the government to handle it if they need your data for something and not just get it and use it for no reason what so ever.
Case in point, an article in the local paper, had some government worker get access to someone’s data or files for something.
Not content to read it, he put all sorts of garbage in the files, crimes that the person hadn’t done, etc, he was caught of course.
But there are governments that are not as transparent as ours, that could do a lot of dammage.
Next, while I am happy for the government to get access to my data when they wish they sort of do it to bits of that anyway, are they secure.
In fact, taking out all the internal issues, if I were a hacker I’d go after the governmental databases so I could pull their backdoor passwords and use them.
Especially if they had to have them stored somewhere well.
I think the only way this would work at all, was if there was a definite reason to do so.
When that eventuated, a temperary account or whatever was created.
There would have to be limits on that, when it was destroyed, it wouldn’t last for ever, if there was nothing to answer for that was destroyed immediately.
But never saved and only certain people had access.
Even if a hacker got access to it, they couldn’t or shouldn’t have the ability to change the account passwords, or even delete the account that would be done somewhere else.
You would only have access to what you needed.
Could someone do something within the loophole created.
If there were procedures on what happened and when, then there probably wouldn’t be one of those.
But its all how they are structured.
Becides all this though articles have proven that big companies like facebook and maybe others are selling the data you have put up there.
I’d imagine that government backdoors could become a valuable asset.
It wouldn’t surprise me if we get more security things to fix after supposed government servers got hacked.
The only reason most of us normal people are safe is we don’t have that much cash, hackers want businesses mainly not us.
But governments start doing that sort of thing they will be targets.
It may work, lets hope it does.
I have had various issues along the lines where government access is concerned, even though I allowed it.
Things like trying to change something with an inaccessible website, only toh ave to use the phone to make that info.
After doing so messing it up and correcting it over the phone.
The data mysteriously vanishing as well as my call to fix it.
The issues not being fixed, and its happened before.
This time, what was worse the government decided to cut off funding for me because of something.
There is a process to follow to get things back but they wanted to get me to proove myself and try to screw me over.
Luckily I was able to get some help and they decided to not persue doing that as I was over my head at that point.
It would be nice if a system like this worked to the bennifit of all consumers and governments.
But the governments rarely have a straight road on any of this.
Excluding issues inside, breaches and the like, people can make mistakes.
In my case, I allowed access to my data, it was secured it was fine.
But no one on the desk either the support switchboard and the level2 case support seemed to know much over guidelines.
Sadly thats as far as I was ever able to get to.
And while yes things got reported, no communication that anything was done.
And while I do need to give access for that data, its obvious thatcustomer service is not on the piority for those that troubleshoot.
The fact is, people want to know why you need access, then its usually ok.
Governments don’t seem to want to communicate or some of them don’t or at least clearly and regularly.
In fact, while my issues were small in comparison to if I had committed an actual offence, there have been articles again in the local paper where someone has a problem, they try to get it fixed, and the government get nasty and screw them over.
It concerns me that even with best intentions, even with the most secured vetted environment and workforce and all that we will still have issues.
Thats fine, but how many issues can the government or service handle without it overwhelming them.
Then you ask why are the government spying on everyone for no good reason.
At which point you start losing trust big time.
For me while I havn’t lost all the trust I have in the income service part of the government, I am now inclined to not take them as seriously as I once would have.
I know that they don’t want to solve issues I report to them and if things get bad, its my fault not them.
So while I will report what I must within law, its not going to be something I will do because I want to.
There are so many fishing mails, you would never know what is truth.

Comments (0)

Happy thanksgiving from the Jared Rimer network

There could be a change in plan where the podcast will be released through TTS introductions and endings, but for this post, lets wonder what people are thankful for this year in tech.

While I was saddened on the closing of GW Micro, I’m happy for two things within the past year.

  • Freedom Scientific allowed us to get JFW for free even upgrading my so-out-of-date license.
  • We’ve got another option in NVDA

The security aspect of this year has been nothing but interesting. I just can’t fathem what the next year will bring with all of the DDOS attacks and botnet activities.

I’m thankful for the meriad of arrests that we’ve seen in the tech field for cybercrime activity. Let it be a deterant to those of us who would want or think about doing such activity. In no way am I saying I’m thinking of doing anything, however, I’d do it for the fun of it if I were to do it, not to harm people. Poking around, maybe.

What are you thankful for this year in tech?

Comments (0)

Freshbooks going offline

For those who use Freshbooks, it is going offline for some maintenance. I saw a tweet, and thought I’d pass it along.


FreshBooks, FreshBooks customer reminder: We are making an upgrade to our cloud platform, which means FreshBooks will be offline tomorrow, November 6th from 6-9 am EST. You will not be able to login into your account at this time, but all your information will remain safe and secure. an hour ago, Hootsuite Inc.


I hope that it helps some to know this info.

Comments Off on Freshbooks going offline

Its time to change time

Hi all,

I am just coming in here to let all know that here in the U.S., its time to change time. I’ve gone ahead and done so, and this will be in effect for the next 6 months or so. I hoep you are enjoying the blog, and I hope to try and get back in to it very soon.

Comments Off on Its time to change time

The Tech podcast is now on apple podcasts

Apple podcasts, otherwise known as itunes, is apple’s platform. < Find our podcast on itunes by going to the link and enjoy!

Comments Off on The Tech podcast is now on apple podcasts

This podcast is on cast box

On the 3rd of this month, I got an Email saying that this podcast is now on castbox. I’ve been slow on updating the blog about it, but its better late than never.

Comments Off on This podcast is on cast box

The tech podcast on overcast

Yesterday, I got an email stating the podcast is available on overcast. You can always go to the tech podcast page on anchor for all the details.

Comments Off on The tech podcast on overcast

Stitcher now has the podcast

Hi all,

Stitcher now has my podcast. Here is that link if you wish to have it.

Comments Off on Stitcher now has the podcast

Anchor update for the evening of September 11th 20:00 hours

I’ve got an update for all of you that might be of interest as we iron out the bugs. Thanks for your support!


Hello folks,

Anchor has submitted my podcasts to other directories. Here are the links to them if you wish to subscribe.

As of the time I’m putting this post together for you, Google is not working, but do keep the link around. This is what was sent to me.

Also, I put the audio directory back on this server, and it looks like that may have fixed some redirect issues that I’ve seen. I’m always working on getting things as seemless as possible. Thanks for your continued support!

Comments Off on Anchor update for the evening of September 11th 20:00 hours

anchor update for September 11

Hi all,

This is a learning experience for all of us. I’ve just updated the information you need page on this blog with this RSS feed. The redirect may be causing some side effects, including:

  • The inability to receive podcasts.
  • A mixture of different episodes.
  • A URL not found when putting the technology.jaredrimer.net/audio in your podcast feed.

This is all a learning experience, because I need to know how to proceed if I want to use anchor on other platforms for my other podcasts.

I appreciate the messages I’ve gotten about the issues.

Some of the comments are dealing with the file names, and I do not have any control of them. I upload it as my file structure, however, it renames the file and that I need to look in to.

Please continue to let me know of any issues so I may enquire in to what is happening. Thanks for reading!

Comments Off on anchor update for September 11

Anchor distributes podcasts

Hi all,

I just received an email from Anchor this morning that the technology blog and podcast is now available on a service called Pocket Cast. I’ve never heard of them, however, I want to take this opportunity to let them know that they are welcome here.

This is ghe link that is provided for pocket cast for people to click on to subscribe.

This is the link to use to go to my profile on Anchor where other links may be of value to you.

This link is for the RSS and I’m interested to know if people are subscribed to the old feed whether it picked up the latest update for podcast 287. Someone told me they didn’t pick it up but yet I uploaded it yesterday.

Welcome aboard!

Comments Off on Anchor distributes podcasts

Mytelespace changing telephone numbers

Hi all, it has come to my attention that Mytelespace, the telephone line that started in 2008, announced a new telephone number. They are announcing that the 832 telephone numbers which we’ve had since we moved to that location are going to be discontinued. The number I’ve been using is 712-432-2831 but they are not announcing that number. The number that was announced as of September 7, 2018 was 720-787-1070. The administration had asked for people to log in using that number, and when I did, I ended up getting a fast busy signal.

Mytelespace announced 5 months ago on their twitter that this was going to be happening, but no timeline was ever given.

If people read this, I’m curious on whether anyone was successful dialing the number provided.

You can email me, or find other contact on the page on the blog entitled information you need. Thanks for reading!

Comments Off on Mytelespace changing telephone numbers

anchor update

Hi folks,

I’ve had to restart the feed, and there were some issues with the import which was automated. I’ve gotten all of the podcasts up, and the blog will have to supplement the RSS with this blog as there is a 1000 character limit. We’re still going to put the mixcloud which I uploaded the last podcast to just today. Your thoughts are still welcome as we beta test together to see how this works. Its always a learning journey.

Comments Off on anchor update

An article is coming for a book review of kingpin

Hello folks,

On podcast 280, I did an audio review of kingpin, which I really wasn’t all that happy with it. I left it that way because I wanted to do it a certain way, but it didn’t quite work out that way. I’ve gotten comments about the review, but I thought I’d write something as well. I’ve now submitted it to Vocal for their platform, and I’ll post that review here when it is available.

Vocal also has some very interesting updates I’ll talk about in this upcoming podcast, and I’m liking what I’m seeing.

Comments Off on An article is coming for a book review of kingpin

my coments on 2 factor authentication

Hi.
Well ran through the casts from last week and looked at things.
I usually don’t comment on stuff but 2 step authentication is nice and it isn’t.
I for example use it on an iphone, thats nice, you get a code on your phone for service, its fine if you have the device in front of you.
The government and other sites I use this have it.
I don’t use it on twitter though, and not on gmail.
Right now, if I do that unless all I do is view mail within chrome, every program using a google service will need an access password called an apps password.
Thats fine but it means more and more passwords to more and more things I struggle to remember the passwords I do use, in fact a lot of the free sites have the same or similar password, my shopping sites have passwords but since I use paypal thats 2 more passwords to enter in.
Google also has a feature which disables anything thats not secured.
In itself its fine, however what I don’t care about is that the only apps that google allows when this is set to on are google apps made by google.
So in short, if I am secured I have no choice, or independance if say I want to use thunderbird so I don’t do it on gmail.
Some sites allow different methods, ie email or other methods for handle the 2 step, if your phone is not in range some don’t.
2 factor itself is a darn good idea, the way its implimented can sometimes leave you wandering.
For example if I turned on all the so called security settings for google I would be stuck to google apps which is probably why they are making every app you use which is not google have a password.
If I need to signin to x site all the time, I don’t necessarily want to have to put in a code and access it.
Yes you can set something to trusted but its means another cookie and I don’t care about tracking we get enough of this as it is.
We still have a good way to go for it, for some things we allready have this sorted but for others well I don’t know.

Comments (1)

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Hi all,

Here’s my next tech book I’m going to read. I found it both on bookshare and bard. I was actually surprised to find it on BARD, but it is actually there.

For those outside the United States, you can definitely get it off of Amazon through Kindle or autible.

Here is the information about the book.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

By: Bruce Schneier

Synopsis

You are under surveillance right now. Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns
are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re
thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil
us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but
also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides
share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate
surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance
society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that
values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business
models, while also providing tips for you to protect your privacy every day. You’ll never look at your phone, your computer, your credit cards, or even
your car in the same way again.

Copyright: 2015

It is also available on bard as DB 81511.

I plan to review it for this cast as well when i’m done. It sounds facinating!

Have you read this book, and if so, what did you think?

Comments Off on Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Comments to posts

Hi jared.
Firstly a minor admin notice.
Due to the fact I couldn’t get jetpack to update because of some sort of extraction error I had to completely kill and reinstall it.
If something is screwed with jetpack or wordpress settings please set things to how you want.
I have tried to set things that should be set right, but I am only human.
Thanks, crashmaster.

Articles.
Specter and meltdown.
Yeah, this is old by a few days from us cert.
Is it a problem?
judging from firmware updates to the new hp remote box that came out today it seems its patched.
Just remember all that have them, if you get an update to your firmware please install it.
Please check your updates the way you do them from your manufacturer’s site.
Chances are the automatically installed software will do that when you run it but if not or you removed it, you need your machiens serial number or something to get access at least for hp units.
2. android.
Nothing is secure, be carefull where you go this thing will get fixed like everything else even if its not done allready.
Next government sites.
You’d think they would be secured, but yeah our government has been blasted because sites were not secured right.
And even if they are secure, overload that site and you may get information which is not yours or worse.
I havn’t had issues with non secured sites, but have had an issue where all benifits were cut because of a system crash.
I reported on time my situation it was noted down and shortly after that I was traveling.
I get back and am told all benifits are cut because I didn’t report.
I ring contact centre.
The data did come through but the system crashed so the output never made it.
The system was fixed, but as my situation did not go over the benifit expiry date no one thought about fixing the error and a lot of error messages got sent and that was all.
The opperater said after a pause of a minute that checks with the customs computers proved I was back and my data matched and that there in fact was no issue and the errors were just errors.
A sinical version of me though could be fooled into thinking that the data never made it and they were covering their rears.
The issue was fixed, and I was told to call back if there was an issue.
Here is the issue, after going through not only 2 step, but voice, photo, police, security, and several address checks, codes both via paper, voice and in person as well as email, you’d think if the system was nice and secure that if it screwed up someone would be able to notice it but I guess not.
Sadly an open system like android will be prone to more security issues than closed source, opensource is good, faster upgrades, faster patching, better security, and full user interaction, but the same things that make it fast are security holes.
Its the risk you take with your stuff there is nothing different.
Do I trust local and national government systems, I don’t say with my data, I do trust that they are secure enough I don’t have to worry about them if they don’t work.
Ofcause, while I need to access them the times I really need to directly access them are rarely to almost never and only have to be for security, varification checks, revarification and or if I need to travel, or update passports, address details, or services.
Most of this is automatic and so I am confident it works, ofcause if I forget my password thats a problem which I probably will since I hardly need to access the system.
I do have an access pin which I hope I never forget.
I do have questions but I just hope I don’t forget those.
There is always a ballance between user and security, you need to find it then you may be fine or maybe not.

Comments Off on Comments to posts

Comments for this week

Hi.
Thought I’d lump everything into this thing.
1. dictation is it secure.
Sure, are your habbits secure?
Would you yell your credit card number in a public place to all that can hear.
No.
The same is for medical information.
I would assume you would set things up when at home, or in the place if thats how you handled things.
There are just some things you type in even if you can dictate, its commen sence.
Sadly while not secure info exactly I have heard people yell conversations out in the bars on their phones or in cafes or other eateries.
Not only is it diskirtious and really insecure its annoying as muther fucking god!
We don’t need this.
If used properly then dictation is a usefull tool.
Put it this way, if you get crushed to death by your chipper because you decided to unstick a jam by putting your foot in it and giving it a shove?
Probably if its broken but if by the action you breaking it further by doing that it probably is your’s.
With technologies like dictation a lot of the owniss should actually be on the user.
Now if that info is online and gets hacked via dictation thats another thing entirely but I do think users need to use their ai systems a lot more well like you would do normally.
The net is almost the same as real life and should be treated as such.
Your identity is public, your information is public, I am sure some government agency is reading this post.
Thats what we all should be thinking, big brother is watching.
That means don’t be an intire fucking idiot, don’t be stupid.
This is the real world we are talking here, sadly some just choose or believe its not.
Text is a terrible medium to write in at any case voice is the key but there is a risk in everything.
2. klango.
I used it back when dialup existed and yeah I remember it all.
At first it was fine but as forums and groups grew out of proportion things started to go wrong.
I never used it extensively, but there were rumors of bad management, hackers, bad admin staff, one rumor from a user to another said that after reporting that after a particularly bad time with arguments with another user an admin told them to go kill themselves.
Ofcause rumors in these places like any electronic board are rife, so are banns for no reason, bad admins and the like.
I kept out of people’s way but as links broke and badness came out of it things improved klango died.
With twitter going the way it seems to be and facebook not far behind klango may rise up again it was a good platform I wish it could be continued and upgraded.
With the event of win10 and other things, privacy is a big thing, but choosing what we have on means we choose to share things like location, speech data, update information etc.
Using a modern system from windows to apple to android means to have the interactive experience we have we need to send a lot of data gigs and gigs of it.
And that data will be stored and sadly used for adds and addware because we as users want to be as low cost or free as we can.
Nothing is free even if they say it is.
And while I don’t care for adds, I do view adds and promotions for things like my shopping mall, bits for the paper, things like that.
The issue is that if I am having adds I want them for my city for things I recognise not forign adds. and ofcause the dangerous ones always exist.
You can’t control internet adds etc.
I mean we all get spam snailmail, and sometimes we read it.
In 1996 to 2001, spam email actually worked like normal junkmail.
If junk mail that we recieved via post came via email maybe once a day and not all the time, then I’d read it.
All those catalogs and whats on things.
Another issue with all this is that we try to fix what is not broken.
Most of the security is not in fact a virus, hacker or ransomware attack.
Its that we need to be carefull within ourselves and not be half asleep especially online.
And with that I will go and sleep myself.

Comments Off on Comments for this week

comments on various things

Hi.
Well firstly the updates for patch tuesday.
Yeah, for home users the thing will not be a problem unless you just happen to be the unhappy owner of an first generation intel i3 530m mobile type chip.
My uncle’s server has an really mangled m530 first gen, it was really slow to begin with, fast first loaded, but fully loaded was slow.
Cleared off and maintained still on the slow side.
With the update almost useless.
For all the 7th gen and 3rd gen units I own including a first gen or second gen i3 standard from 2009 its not that bad.
Transfering files on all systems from flash drives from and to does seem to slow down a lot especially when its small files I have to deal with.
What should have taken me 5 hours now takes me most of a day.
But since I don’t have to transfer 10-100gb per day thats hardly the issue as such.
I had to recover a friends data for him and have a little to go.
Next swatting, I think this could be added to the nusance or at least scam calls.
You don’t like someone, you get a swat team on them.
There is just one floor in this attack.
The police are not dumb!
They are the police, trusted inforcers of the law so they are not dumb!!!
Except they seem to be as dumb as the cucumber I eat on my salad.
Technically this attack is as bad as something trying to scan a port, its not as bad as a traditional spam attack, or ransomware, but if successfull it can deliver as much dammage as a virus with ransomware, malware, fishing hoax and spam/worm trogen elements.
The only semi cool part of this for the geeks here is that till they get smarter, there is actually a way for you to get destroyed by your computer (the machines are coming! run for your lives)
Seriously though this attack shouldn’t even be able to succeed and even if it did like spam emails it should be recognised as such and handled accordingly.
You’d better hope there isn’t a robot uprising tomorrow because the machines are smarter than us
I do think swatting can be added to hoaxes, fishing and scams in general maybe spam.
The attacks are initiated online in a forum, a bit hard to get handled unless certain phrases are blocked I guess.
Once on twitter, as long as person x keeps the same name well who knows.
If they don’t mask their ips then they can probably be traced.
For those that do its almost impossible.
I recieve scam calls, emails, etc every so often.
The emails and calls are not dangerous in themselves but if you follow them, open their attachments or click their links they can be.
I guess we are only human but this attack is easy to avoid and even if something does happen it should be easy to realise that its a hoax.

Comments Off on comments on various things

Older Posts »

go to sections menu


navigation menu

go to sections menu